Trusted Computing and DRM

@inproceedings{Zaidenberg2015TrustedCA,
  title={Trusted Computing and DRM},
  author={N. Zaidenberg and P. Neittaanm{\"a}ki and Michael Kiperberg and A. Resh},
  year={2015}
}
Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of… Expand
3 Citations
System for Executing Encrypted Java Programs
  • 1
  • PDF
Modern Blue Pills and Red Pills
  • 3
Efficient Protection for VDI Workstations

References

SHOWING 1-5 OF 5 REFERENCES
Non-interactive zero-knowledge and its applications
  • 668
  • Highly Influential
How to Explain Zero-Knowledge Protocols to Your Children
  • 170
  • PDF
Blackhat DC 2009 “Attacking Intel® Trusted Execution Technology
  • 2009
TrulyProtect 2.0 and attacks on TrulyProtect 1.0
  • ECIW
  • 2013
Blackhat DC 2010 “hacking the smartcard chip
  • 2010